COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption).
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Public and private keys: an example Bob wants to send Alice an encrypted email. To do this, Bob takes Alice’s public key and encrypts his message to her. Then, when Alice receives the message, she takes the private key that is known only to her in order to decrypt the message from Bob.

Detailed explanation-2: -The most well-known example of Asymmetric Encryption is the Digital Signature Algorithm (DSA). Developed by National Institute of Standards and Technology (NIST) in 1991, DSA is used for digital signature and its verification.

There is 1 question to complete.